Sciweavers

4650 search results - page 713 / 930
» Generating and evaluating evaluative arguments
Sort
View
122
Voted
DAC
2005
ACM
15 years 6 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga
125
Voted
DOCENG
2005
ACM
15 years 6 months ago
An environment for maintaining computation dependency in XML documents
In the domain of XML authoring, there have been many tools to help users to edit XML documents. These tools make it easier to produce complex documents by using such technologies ...
Dongxi Liu, Zhenjiang Hu, Masato Takeichi
136
Voted
BIBE
2007
IEEE
126views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
An End-to-End Process for Cancer Identification from Images of Lung Tissue
— This research describes a non-interactive process that applies several forms of computational intelligence to the task of classifying biopsy lung tissue samples based on visual...
Walker H. Land Jr., Daniel W. McKee, Tatyana Zhuko...
115
Voted
CONEXT
2008
ACM
15 years 6 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
123
Voted
CSEE
2008
Springer
15 years 6 months ago
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning
Students have to cope with new technologies, changing environments, and conflicting changes in capstone projects. They often lack practical experience, which might lead to failing...
Eric Ras, Jörg Rech